LogJam Reactions

just got a ticket in, to investigate if our FTPS Servers are vulnerable to the new LogJam issues.
After a quick read, i think disableing CipherSuites 28 and 29 (DHE_RSA_AES128,DHE_RSA_AES256) should do the job.
Do i miss something ?

On the page https://weakdh.org/sysadmin.html is another advice regarding this problem:

Generate a Strong, Unique Diffie Hellman Group. A few fixed groups are used by millions of servers, which makes them an optimal target for precomputation, and potential eavesdropping. Administrators should generate unique, 2048-bit or stronger Diffie-Hellman groups using "safe" primes for each website or server.

Is there something we can Do when using the SBB or is this some other area ?

I have the same issue with our partner requiring a longer bit length (i.e. 2048 or more) for the Diffie-Helman key. However, I am attempting (and failing) to establish a connection using the SBSimpleSftp.TElSimpleSFTPClient object in C#. Is there an equivalent means of altering the key length for SFTP, as I believe the above event handler and property do not exist in my case.

Alexander, I've noticed there is no Support Access Ticket linked to your user account on EldoS site. Technical Support is provided to customers with the linked Support Access Ticket. You will find your Support Access Ticket together with all the details about how to use it in the registration e-mail that we’ve sent to you upon the purchase.

If you are evaluating the product and don't have a license yet, please let us know and then you can have support according to Basic support level. Basic support level includes answering basic technical questions that appear during product evaluation period. We also offer Premium support for a purchase from https://www.eldos.com/support/calc.php . You can use Premium Support to get higher level of assistance during your evaluation of our products.